Security Patterns for Physical Access Control Systems

Size: px
Start display at page:

Download "Security Patterns for Physical Access Control Systems"

Transcription

1 Security Patterns for Physical Access Control Systems Eduardo B. Fernandez, Jose Ballesteros, Ana C. Desouza-Doucet, and Maria M. Larrondo-Petrie Department of Computer Science and Engineering Florida Atlantic University Boca Raton, Florida 33431, USA Abstract. Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to take this convergence at a more abstract level first. Although introduced about 10 years ago, security patterns have recently become accepted by industry and two books on this topic have appeared recently. Security patterns for information access control have appeared but now we extend this concept to access for physical units. The unification of information and physical access control is just beginning but the strong requirements of infrastructure protection will make this convergence to happen rapidly. Examining existing systems, industry standards and government regulations, we describe, in the form of patterns, the core set of features a physical access control system should have. The paper illustrates the structure and use of these patterns. Keywords: access control, intelligent buildings, physical access control, security, software patterns. 1 Introduction Homeland security has brought an added interest in control of access to buildings and other physical structures. The need to protect assets in buildings and to control access to restricted areas such as airports, naval ports, government agencies, and nuclear plants to name a few, created a great business opportunity for the physical access control industry and a good amount of interest in the research community. One of the results of this interest was the recognition that access control to information and access control to physical locations have many common aspects. The most basic model of access control uses a tuple (s,o,t), subject, object, access type. If we interpret s as a person (instead of an acting executing

2 II entity), o as a physical structure (instead of a computational resource), and t as a physical access type (instead of resource access), we can make an analogy where we can apply known results or approaches from information access control. The unification of information and physical access control is just beginning but the strong requirements for infrastructure protection will make this convergence to happen rapidly. Another issue is the fact that there are standard network protocols for building automation, e.g. BACnet [1], which are totally different of the protocols used for manufacturing automation, e.g. DNP3 [2]. Both types of protocols define security standards, which means that a building intended for manufacturing would have two sets of incompatible security standards. We need some way to abstract the security requirements of the complete system without regard to specific standard details. One way to achieve this unification is using a conceptual abstraction for the definition of security requirements; we consider here the use of analysis and security patterns for this purpose. A pattern is an encapsulated solution to a recurrent problem in a given context [3][4]. In particular, a security pattern defines a solution to a security problem [5]. In general, the use of patterns has been increasing in industry because of their potential to improve software quality. Although introduced about 10 years ago, security patterns have only recently become accepted by industry and Microsoft, IBM, and Sun have web pages on this topic. Also, two books have appeared recently [5][6]. We have presented several security patterns for access control to information, e.g. [7][8], and now we extend this concept to the access of physical units. Standards and products that deal with physical units use a set of common concepts that may appear different due to a different notation; patterns make this commonality apparent. Examining existing systems, industry standards, and government regulations, we describe, in the form of patterns, the relationship and definition of a core set of features a physical access control system should have. From these patterns, it is possible to define more specific patterns that can be used to build systems in a given protocol or to define new protocols. These patterns can also be combined to make up complex systems. We present here patterns for access control in physical units. While we cannot be complete, we show three of them to illustrate their structure and possibilities: Alarm Monitoring. Defines a way to raise events in the system that might require special attention, like the tampering of a door. Relays. Defines the interactions with electronically controlled switches. Access Control to Physical Structures. Applies authentication and authorization (RBAC) to the control of access to physical units including alarm monitoring, relays, and time schedules that can control when things will happen. The pattern diagram of Figure 1 shows how these patterns relate to each other and to related existing patterns. The patterns not explicitly described here include:

3 III Fig. 1. Pattern diagram of physical access control patterns. Physical Structure [9]. Defines the structure and use of physical sites such as buildings, parking lots, and similar, as well as their divisions and compartments. Scheduler. Provides timing information to control access. Role-Based Access Control [7]. Describes the standard RBAC model used here to describe authorization to access a physical unit. Reference Monitor [5]. Enforces authorizations when a process requests access to an object. Authenticator [10]. Verifies that a subject is who it says it is. Alarm Monitoring, Relays, Scheduler, and Physical Structure are composed to form the Access Control to Physical Structures pattern. RBAC defines the type of authorization rules used in the system, while the reference monitor indicates an abstract pattern representing enforcement mechanisms. Authenticator is an abstract pattern defining the requirements for authentication. We present these patterns following the POSA template [3]. This template intends to provide enough detail to be a guideline for a designer building a system that requires this pattern. The set of patterns can also be used to define precise requirements and to evaluate existing systems. The solutions are described by UML diagrams, which although not strictly formal, are precise and unambiguous (UML has a well-defined syntactic metamodel). Because each pattern must be reusable on its own, there is some amount of redundancy between patterns. Each pattern is relatively simple but it can be combined with others to build complex systems. Section 2 describes some background. Section 3 presents first two patterns that complement physical access (Alarm Monitoring and Relays). These patterns are then combined with other patterns to define a composite pattern that describes the necessary elements of a physical access control system. Section 4

4 IV includes a short discussion and comparison to other approaches. We end with some conclusions. 2 Background Physical access control systems are widely used today and they can be implemented with a wide range of technologies. The basic idea is that something controls access to someplace; it could as simple as a key lock and as complex as a face recognition device. Moreover, there are ways to detect and inform when someone violates the access rules or tries to force the system. This simple definition leaves room for a great number of features and combinations in software and hardware that vary from product to product. To understand access control, we must understand the language of the industry. Terms like the ones discussed in the patterns presented here are commonly used when discussing access control systems. Other terms include: Access control panels. Serves as an interface to the readers and door locks. Wiring in a network interconnects most of these panels. Electric door locks. Keep the doors locked and secure, and release the door when a valid credential is used. Shunting of alarm devices. Means to bypass or ignore an alarm for a specified period of time. Anti-pass back. Used to prevent tailgating (when one user enters with a valid credential, and several people enter without using theirs). As indicated earlier, a pattern describes a solution to a specific problem in a given context. Patterns are abstractions of real systems, emphasizing best practices and fundamental features, we found these patterns by analyzing real systems or standards. A security pattern describes an abstraction of a security mechanism able to avoid or mitigate some threats [5][6]. In addition to the two mentioned books about security patterns, a variety of security patterns have appeared in the literature [11]. It is common practice to describe the solution encapsulated in a pattern using UML (Unified Modeling Language) diagrams. UML is a standard for software development and its models are graphic and intuitive and can be conveniently converted into code. In addition, as indicated earlier, UML is a semi-formal language that provides a good amount of precision. There have been attempts to further formalize patterns but their importance comes not from an ability to prove security properties of the system but because of the fact that they are known to be good practices, based on experience. In addition, since each pattern is rather simple, they can be used by practitioners; many software developers know UML but are not able to use formal methods. Patterns are described using some type of template, consisting of a specific set of sections with predefined meanings. We use here the so-called POSA template [Bus96] which includes the following sections: A Name, that should be unique and precise.

5 V A thumbnail summary of the pattern (what problem does it solve?) An example of a situation where a solution is needed. The context where the pattern is valid or applicable. The general problem solved by the pattern. A solution section, describing the idea of the solution. This includes two subsections, a Structure section describing a class diagram of the solution, and a Dynamics section describing some typical use case sequences. The Implementation section provides hints in using the pattern. The example resolved shows how the pattern can solve the problem of the example presented earlier. The Known Uses section indicates some real uses of the pattern. The consequences indicate the advantages and disadvantages of using this solution. The section on related patterns enumerate patterns which solve similar problems or are complementary to this pattern. 3 Patterns 3.1 Alarm Monitoring Defines a way to raise events in the system that might require special attention, such as someone tampering with a door. Example Building management wants to raise alarm events when someone opens a door without using the right credentials or when someone tries to use a card that was reported as lost. Context Physical environment with an access control system where we want to be able to raise filtered alarm events and we want to differentiate between alarms that are generated because of a physical violation of the system and alarms generated because of a system rule violation. Problem In an Access control system, there are two types of alarms, physical and logical. Many times we might want inform more than one subsystem that a change of state happened in order to generate different types of configurable actions that can vary. Physical alarm inputs are used to monitor various devices. These alarms can be shunted. Logical alarms are used to monitor various system rules. For example, a system may generate an alarm after three invalid tries to get access with the same credentials. The following forces will affect any solution: There are two types of alarms, physical and logical. Alarms can be ignored. Logical alarms have two possible states, reset and alarm.

6 VI Physical alarms have four possible states: reset, alarm, cut or short. The last two states are known as trouble states, caused by faulty wiring or tampering. We may need to know what alarms have been set and when they were reset. We need a way to inform interested parties about a change of a state of an alarm. Solution Have an alarm entity that describes the general concepts of an alarm and use generalization to separate logical alarms from physical alarms and their particular characteristics. Add information about the time the alarm occurred. Use the Observer Pattern [4] to advise any interested party of a change of state in an Alarm. Fig. 2. Class Diagram for Alarm Monitoring Structure Figure 2 shows a UML class diagram for the Alarm Monitoring pattern. Abstract class Alarm indicates a general class for any type of alarm. The PhysicalAlarm class and the LogicalAlarm class inherit the Alarm class. These classes allow for alarms to be controlled and monitored. By implementing the AlarmObserver interface any class (not shown here) interested on this alarm can be added to the list of observers for the alarm and will be advised when a change of state happens. Moreover, we log every alarm activity with a time stamp.

7 VII Fig. 3. Sequence Diagram for Activating an Alarm Dynamics Figure 3 shows the main success scenario for the use case activate an alarm. The request to set the alarm active is sent by an external actor that detected the need to raise the alarm. The change of state is logged and only if the alarm is being monitored interested parties are advised of the change, otherwise the alarm is ignored. Implementation There are many ways to create alarms in a physical access control system. For example, when a card reader is installed on a door, an alarm contact is usually installed as well. The alarm point is used to monitor whether the door was forced or held for too long after a valid access was granted. Logical Alarms can be generated for maximum tries with invalid credential, invalid credential and communication errors. The call to change the state of an alarm could in turn generate other actions when observers are notified, like displaying a message, activating a siren, etc. Example resolved Every time someone opens a door without proper permission an alarm can be created and if a person uses a lost badge the system can generate a logical alarm. Known uses Many commercial Access Control systems have the concept of logical and physical alarms that generate some actions when the states are changed. Consequences Advantages include: We can only pay attention to the alarms we are interested in. Every alarm change of state is logged, and interested parties are advised. This model provides the basic structure for supporting alarms in an access control system.

8 VIII We make a distinction between logical and physical alarms, which supports the creation of any alarm independently of the existing hardware. A disadvantage is: The pattern may create overhead for systems that only care about logging the alarm. Related Patterns This pattern is based on the Observer Pattern [4]. The Access Control for Physical Structures [9] complements this pattern by adding the concept of Zones that control Alarms. 3.2 Relays Fig. 4. Class Diagram for Relays This pattern defines the interactions with electronically controlled switches. Example Building management wants to be able to open the main gate for visitors that do not have credentials. Moreover, doors should be opened when someone presents valid credentials. Context Physical environment with an access control system where we want to be able turn on/off devices; and lock/unlock doors. Problem A relay is an electronically controlled switch. Similar to a light switch on the wall being used to turn on or off a light, a relay can be used to turn on or off other devices. Relays are used to activate the electric door lock, or to

9 IX activate a variety of other items such as: bells, sirens, turn lights on and off, trip a digital dialer and many other uses. Typically, one relay is used to control the electric strike of doors. The others, usually called auxiliary relays, can be used as needed. When a relay is activated or deactivated, the device wired to it is turned on or off. The following forces will affect the solution: We need to distinguish between door relays and auxiliary relays. Relays can be activated and deactivated. Relays can be activated indefinitely or for a defined period of time. Relays have two possible states: on and off. Solution Have a relay entity that describes the general concepts of a relay and use generalization to separate door relays from auxiliary relays and their particular characteristics. Structure Figure 4 shows a UML class diagram for the Relays pattern. Abstract class Relay indicates a general class for any type of relay. The DoorRelay class and the AuxRelay class inherit the Relay class. These classes allow for relays to be controlled. Dynamics The sequence diagram is trivial. The request to set the relay active is sent by an external actor. The relay is activated for the previously defined on time. If the relay was already active the timer is restarted. Once the timer expires the relay is turned off. Implementation Relays could be activated or deactivated by a variety of events. An alarm input, a valid credential, an egress button being pushed, or a time event, can all activate a relay. Example resolved Doors that have relays defined can be opened when a valid credential is presented. Also the main gate can be assigned an auxiliary relay that can be activated at will. Known uses Many commercial Access Control systems have the concept of relay management and distinction between door and aux relays. Consequences Advantages include: We can distinguish between auxiliary and door relays. We can activate relays for a predefined amount of time. This model provides the basic structure for supporting relays in an access control system.

10 X A disadvantage is: We might want the same kind of functionality for devices that are not exactly door or aux relays. Related Patterns The Access Control for Physical Structures [9] complements this pattern by adding the concept of Zones that control Relays. 3.3 Access Control to Physical Structures Applies authentication and authorization to the control of access to physical units including alarm monitoring, relays, and time schedules that can control when things will happen. Example Building management wants to put in place an access control system to control access to certain zones and to control who can access the zones. They need to deny all access to certain zones after 5pm. They want to generate alarms when someone tries to access a zone for which they do not have permission and start monitoring alarms for all the exterior doors at 8pm. Moreover, they want to turn on the main door light at 7pm. Context Physical environment with access control system where we need to control access and turn on/off devices based on time constrains. Problem We need a way to enforce business rules in an access control system that take effect at a given time and day of the week. For example, a user may have different access needs on different days, as in the following example: 08:30-17:00 Mon Wed Fri Standard Hours 08:30-19:00 Tue Thur Stays Late 2 Days a Week 08:00-12:00 half a day on Saturday The following forces affect the solution: We need a way to automatically cancel access for everyone to some areas of a building at given time and day of the week. Some users might have access to some areas only during a time range of the day. We need to provide a way to automatically activate devices based on the time and day of the week. We need a way to represent a day of the week and time. This pattern expands the Access Control to Physical Structures Pattern [9]. Therefore all the forces presented in that pattern are present in this pattern as well. We need to restrict access to some users depending on the identity or other characteristics of the visitor. The boundaries of the unit of access must be clearly defined. There is a variety of users such as employees, contractors, repairpersons, etc., that require access to different parts of a building.

11 Fig. 5. Class Diagram for Access Control to Physical Structures XI

12 XII Since some units will be normally closed, it is necessary to create policies and plans in case of an emergency, such as earthquake or fire. We may need to keep track of who entered each unit and when. Solution Define the structure of an access control system using an RBAC pattern [7]. Integrate the Alarms Monitoring and Relays patterns and introduce the concept of a time schedule to control when things can/must happen. Time Schedules have two uses; one is to control access times and the other is to configure automatic actions. Structure Figure 5 shows a UML class diagram for the Access Control to Physical Structures pattern. We can see how the Alarms Monitoring pattern can be integrated so that Zones can control Alarms. We also use the Relays pattern so that each door has its own Door Relay and the Aux Relays can be used to turn on/off devices. Zones can control Relays. We introduce a TimeSchedule class that consists of a few time intervals. A Time Interval consists of a start time, a stop time, and selected day of the week. When the system clock activates a Time Schedule, it can automatically perform some actions. Relays can be turned on and off, alarm zones can be activated or deactivated, and doors can be unlocked. To control access times, roles are combined with Time Schedule to determine both where and when a user can gain access to zones and we also need to be able to assign a Time Schedule for the entire zone that applies to all users. Dynamics Figure 6 shows a main success scenario for the use case enter a zone. When the control is passed to the zone, the Zone and the Role will consider their Time Schedules before authorizing a person. Also when the Zone opens or closes a door, the Door calls its Relay to perform the action. Other use cases include: zone access denied by zone time schedule, role access denied by time schedule, and activate alarm by role access denied ; they are not shown for conciseness. Implementation Access control systems use centralized processing, distributed processing, or hybrid arrangement. The system architecture should be taken into consideration when designing an access control system, since it can have a significant effect upon operation during a catastrophic system failure. Centralized Processing In computer dependent processing systems, all events are gathered by the field panels, and are then sent to the computer for processing. For example if a credential is presented at a door, the door sends the credentials to the central computer or processor. The computer checks the credential against its programming and determines if it is allowed through that door at that time. If valid the computer sends a command back to the panel to release the door. In these systems if the computer goes down, or if communications between the

13 XIII Fig. 6. Sequence Diagram for Entering a Zone panel and computer is lost, the system can no longer function, to verify proper access, and to process alarms. Distributed Processing In distributed processing systems the database is loaded to the field panel. All decisions are made at the field panel and are passed to the computer or logging printer for storage. In these systems if communications is lost, access control continues uninhibited. Furthermore, the events can sometimes be stored in the panels, and can be sent up to the computer once communications is restored. Due to their architecture, systems which employ distributed processing generally offer better reliability, and faster response than systems that rely on central computers for all decision making. Example resolved Building management can configure time schedules and assign them to Zones and Roles, that a way a Zone could have a time schedule from 8-5pm. Moreover, time schedules can be assigned to Relays and Alarms so that they can be activated and monitored respectively when the system clock activates these time schedules. Known uses Many commercial or institutional buildings control access to restricted units using the concepts presented here. This model corresponds to an architecture that is seen in commercial products, such as: Secure Perfect, Picture Perfect and Diamond II. BACnet is a standard that includes access control to buildings and incorporates RBAC, zones, and schedules [12].

14 XIV Consequences They are a combination of the previous patterns. Related Patterns This pattern is a combination of the RBAC (or another suitable authorization model [7], the Physical Structures pattern, the Access Control for Physical Structures pattern, the Alarm Monitoring pattern, and the Relays pattern. 4 Related work and discussion There is a considerable amount of work on the security of SCADA (Supervisory Control and Data Acquisition) networks, e.g. [13][2]. However, that type of security is not applicable to physical protection, SCADA security applies only to the information functions of these networks. Building security appears as a neglected area, the only analysis of this problem come from industry white papers, e.g. [14], which emphasizes the need for the convergence of physical and logical security. Some documents about BACnet discuss its rationale, which has some close aspects to our work, they use RBAC and try to derive conceptual models of their protocols but they are tied to some implementation details. R.Martin s book [15] has a detailed building security system used as an example of applying object-oriented methods, but he does not use patterns. Some work attempts to find ways to control location information of people, e.g. [16]. A model of that type can be made more precise by specifying more closely the location information, as we can do with our patterns. [17] proposes a formal model for the release of information about user location in a smart building while respecting privacy constraints. Our approach can be used to define location of sensors and for interpreting information about user location. By defining more closely the location of a user, her privacy can be protected more precisely. Our finer location definition comes from the fact that we use the Composite pattern [4], a recursive structure that can have any levels of containment. This approach can also be combined with approaches that use geometric models of location [18] by providing an anchor or context for the location information. There is also much work on context-dependent security, e.g. [19][20], where access to services or resources depends on the location of the user. It is clear that our model can make contexts more specific by defining them in relation to zones or access points (gates). Context models are usually applied in wireless environments, a user could prove wirelessly that he is in front of a gate and that gate could be opened remotely. In the literature, the rights considered are about information, e.g. to a list of nearby restaurants, our approach can unify both types of accesses. Emergency situations are very important for physical access, in the case of fire all doors should be opened, in the case of an attack as the recent one at Virginia Tech, all doors could be closed. Our model handles these cases very well, all the doors are just instances of a class Door and we can have operations such as open all doors or close all doors, that apply to all the objects of that class.

15 XV As indicated earlier, the presented model is semi-formal. It can be made more formal by adding Object Constraint Language (OCL) constraints [21]. OCL can be used to add formal annotations to a UML model. Another possibility is the use of the template notation of [22]. In that way, we can at least define more precise requirements and maybe prove properties of some sections of the system. 5 Conclusions We have described using patterns the basic features and concepts that any modern Physical Access Control system must have. As indicated, these patterns can guide the design of physical access control systems or they can be used to evaluate current products of this type. Other possibilities include the dynamic restriction of the locations where a suspicious user could go or reconfiguration of exits in case of emergencies. They can also be used in conjunction with privacyoriented models. Another next step is a pattern that could be more event-driven in a way that any subsystem that generates events could be hooked dynamically. Our Access Control system could be one of the subsystems as well as a video system, a metal detector, a drug detector, and so forth. The contributions of this paper include a constructive semi-formal model of access control to physical structures and a set of patterns, which can be used on their own to build other models. This model also illustrates composition of features by composing patterns. Our future work will include combining this model with identity management patterns [23], with context-based models, and with traditional RBAC models (users could have their access to information and to physical locations defined by the same model). Further formalization is another aspect we are considering. Finally, physical accesses may involve not just entering a zone but may include physical removal of specific objects identified by RFID devices. References 1. SSPC135/LSS-WG: Physical access control with bacnet ( (October 2006) 2. Majdalawieh, M., Parisi-Presicce, F., Wijesekera, D.: Dnpsec: A security framework for dnp3 in scada systems. In: Internat. Joint Conf. on Computer Information and Systems Sciences and Engineering, Bridgeport, CT. (Dec ) 3. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M.: Pattern- Oriented Software Architecture: A System of Patterns, Volume 1. Wiley (1996) 4. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston, Mass. (1994) 5. Schumacher, M., E.B.Fernandez, Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating security and systems engineering. J. Wiley & Sons (2006) 6. Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Strategies for J2EE, Web Services, and Identity Management. Prentice Hall, Upper Saddle River, New Jersey (2005)

16 XVI 7. Fernandez, E.B., Pan, R.: A pattern language for security models. In: Procs, of PLoP 2001, submissions/acceptedpapers.html 8. Priebe, T., Fernandez, E.B., Mehlau, J.I., Pernul, G.: A pattern system for access control. In: Procs. of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain (July 2004) Desouza-Doucet, A.: Controlling access to physical locations, M.S. Thesis, dept. of computer science and eng., florida atlantic university. (April 2006) 10. Fernandez, E.B., Sinibaldi, J.C.: More patterns for operating system access control. In: Proc. of the 8th European conference on Pattern Languages of Programs, (2003) Fernandez, E.B.: Security patterns (keynote talk and paper). In: Procs. of the Eigth International Symposium on System and Information Security - SSI2006, Sao Jose dos Campos, Brazil (November ) 12. Ritter, D., Isler, B., Mundt, H., Treado, S.: Access control in bacnet. BACnet today (supplement to ASHRAE Journal) (November 2006) B26 B Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M., Shenoi, S.: Security strategies for scada networks. In: Procs. First Annual IFIP WG International Conference on Critical Infrastructure Protection 14. Imprivata( Bridging the great divide: The convergence of physical and logical security. (August 2006) 15. Martin, R.: Chapter 6 in Designing Object-Oriented C++ Applications Using the Booch Method. Prentice-Hall (1995) 16. Hengartner, U., Steenkiste, P.: Implementing access control to people location information. In: Procs. of the ACM Symposium on Access Control Models and Technologies (SACMAT 04). (2004) 17. Boyer, J., Tan, K., Gunter, C.: Privacy-sensitive location information systems in smart buildings. In: Procs. of the 3rd Int. Conf. on Security for Pervasive Computing, York, England (April 2006) 18. Atluri, V., Shin, H.: Efficient enforcement of security policies based on tracking of mobile users. In: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. (July 2006) 19. Corradi, A., Montanari, R., Tibaldi, D.: Context-based access control management in ubiquitous environments. In: Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA 04), Boston, MA (August 30 - September ) 20. Huldenbosch, R., Salden, A., M.S.Bargh, P.W.G.Ebben, Reitsma, J.: Contextsensitive access control. In: Procs. of SACMAT (2005) Warmer, J., Kleppe, A.: The Object Constraint Language (2nd Ed.). Addison- Wesley (2003) 22. Ray, I., Li, N., Kim, D., France, R.: Using parameterized UML to specifiy and compose access control models. In: Proceedings of the Sixth IFIP WG 11.5 Conference on Integrity and Control in Information Systems, Lausanne, Switzerland (November 2003) 23. Delessy, N., E.B.Fernandez, Larrondo-Petrie, M.: A pattern language for identity management. In: accepted for the 2nd IARIA Int. Multiconference on Computing in the Global Information Technology (ICCGI 2007), Guadeloupe, French Caribbean (March )

A methodology for secure software design

A methodology for secure software design A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 ed@cse.fau.edu 1. Introduction A good percentage of the

More information

Understanding Access Control

Understanding Access Control Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly

More information

On Building Secure SCADA Systems using Security Patterns. Outline

On Building Secure SCADA Systems using Security Patterns. Outline On Building Secure SCADA Systems using Security Patterns E.B.Fernandez, J.Wu, M.M. Larrondo-Petrie, and Y. Shao Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton, FL, USA

More information

Cloud Access Security Broker (CASB): A pattern for secure access to cloud services

Cloud Access Security Broker (CASB): A pattern for secure access to cloud services Cloud Access Security Broker (CASB): A pattern for secure access to cloud services EDUARDO B. FERNANDEZ, Florida Atlantic University NOBUKAZU YOSHIOKA, National Institute of Informatics HIRONORI WASHIZAKI,

More information

Two patterns for HIPAA regulations

Two patterns for HIPAA regulations Two patterns for HIPAA regulations Eduardo B. Fernandez 1 and Sergio Mujica 2 1 Florida Atlantic University, Boca Raton, FL, USA 2 Escuela de Ingeniería, Universidad Finis Terrae, Santiago, Chile Abstract

More information

Patterns and Pattern Diagrams for Access Control

Patterns and Pattern Diagrams for Access Control Patterns and Pattern Diagrams for Access Control Eduardo B. Fernandez, Günther Pernul 2 and Maria M. Larrondo-Petrie Florida Atlantic University, Boca Raton, FL 3343, USA ed@cse.fau.edu petrie@fau.edu

More information

Two security patterns: Least Privilege and Security Logger and Auditor

Two security patterns: Least Privilege and Security Logger and Auditor Two security patterns: Least Privilege and Security Logger and Auditor Eduardo B. Fernandez 1, Sergio Mujica 2, and Francisca Valenzuela 2 1 Dept. of Comp. Science and Eng., Florida Atlantic University,

More information

A Pattern for Whitelisting Firewalls (WLF)

A Pattern for Whitelisting Firewalls (WLF) A Pattern for Whitelisting Firewalls (WLF) ISAURA N BONILLA VILLARREAL, Florida Atlantic University EDUARDO B. FERNANDEZ, Florida Atlantic University MARIA M. LARRONDO- PETRIE, Florida Atlantic University

More information

Patterns for cloud firewalls. Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3

Patterns for cloud firewalls. Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3 Patterns for cloud firewalls Eduardo B. Fernandez 1, Nobukazu Yoshioka 2, and Hironori Washizaki 3 1 Dept. of Computer Science and Engineering, Florida Atlantic University, USA, ed@cse.fau.edu 2 GRACE

More information

Analysis Patterns for Patient Treatment Records

Analysis Patterns for Patient Treatment Records Analysis Patterns for Patient Treatment Records Tami Sorgente, Eduardo B. Fernandez, and Maria M. Larrondo Petrie Dept. of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

Two patterns for web services security

Two patterns for web services security Two patterns for web services security Eduardo B. Fernandez Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343, USA Abstract Patterns are widely used in software

More information

Access Control In BACnet

Access Control In BACnet 2006, American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. (www.ashrae.org). Published in ASHRAE Journal Vol. 48, Nov. 2006. For personal use only. Additional reproduction, distribution,

More information

Security Patterns and Secure Systems Design

Security Patterns and Secure Systems Design Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

[2006] IEEE. Reprinted, with permission, from [M. Ye and K. Sandrasegaran, Teaching about Firewall Concepts using the inetwork Simulator, Information

[2006] IEEE. Reprinted, with permission, from [M. Ye and K. Sandrasegaran, Teaching about Firewall Concepts using the inetwork Simulator, Information [2006] IEEE. Reprinted, with permission, from [M. Ye and K. Sandrasegaran, Teaching about Firewall Concepts using the inetwork Simulator, Information Technology Based Higher Education and Training, 2006.

More information

The Software Container pattern

The Software Container pattern The Software Container pattern Madiha H. Syed and Eduardo B. Fernandez Dept. of Computer and Elect. Eng. and Computer Science Florida Atlantic University, Boca Raton, FL 33431, USA msyed2014@fau.edu, ed@cse.fau.edu

More information

Building Systems Using Analysis Patterns Eduardo B. Fernandez Florida Atlantic University Boca Raton, FL ed@cse.fau.edu

Building Systems Using Analysis Patterns Eduardo B. Fernandez Florida Atlantic University Boca Raton, FL ed@cse.fau.edu Building Systems Using Analysis Patterns Eduardo B. Fernandez Florida Atlantic University Boca Raton, FL ed@cse.fau.edu 1. ABSTRACT We consider the use of analysis patterns in the definition of initial

More information

Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol

Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol Cipher Suite Rollback: A Misuse Pattern for the SSL/TLS Client/Server Authentication Handshake Protocol ALI ALKAZIMI, Florida Atlantic University EDUARDO B. FERNANDEZ, Florida Atlantic University Transport

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

The WebShop E-Commerce Framework

The WebShop E-Commerce Framework The WebShop E-Commerce Framework Marcus Fontoura IBM Almaden Research Center 650 Harry Road, San Jose, CA 95120, U.S.A. e-mail: fontouraalmaden.ibm.com Wolfgang Pree Professor of Computer Science Software

More information

Designing Real-Time and Embedded Systems with the COMET/UML method

Designing Real-Time and Embedded Systems with the COMET/UML method By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design

More information

Incorporating database systems into a secure software development methodology

Incorporating database systems into a secure software development methodology Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic

More information

DC-8706K Auto Dial Alarm System

DC-8706K Auto Dial Alarm System DC-8706K Auto Dial Alarm System User Guide Basic Contents: 1x the host unit; 1x wireless door (window) magnet; 1x wireless infrared detector; 2x remote control; 1x siren; 1x phone core; 1x AC to DC power

More information

DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM

DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Part-I: Natural and Applied Sciences ISSN-L: 2223-9553, ISSN: 2223-9944 DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Safaa A. Mahdi Technical Institute, Babylon, IRAQ. amam2012449@yahoo.com

More information

OnGuard Online User Guide

OnGuard Online User Guide OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones

More information

A pattern language for security models

A pattern language for security models A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Dept. of Computer Science and Eng. Flora Atlantic University Boca Raton, FL 33431 ed@cse.fau.edu Abstract Security is a serious

More information

A Pattern Language for Firewalls

A Pattern Language for Firewalls A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Larrondo-Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton,

More information

EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS

EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS David URTING, Stefan VAN BAELEN, Tom HOLVOET and Yolande BERBERS {David.Urting, Stefan.VanBaelen, Tom.Holvoet, Yolande.Berbers}@cs.kuleuven.ac.be

More information

Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point

Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point Two patterns for cloud computing: Secure Virtual Machine Image Repository and Cloud Policy Management Point EDUARDO B. FERNANDEZ, Universidad Tecnica Federico Santa Maria, Chile RAUL MONGE, Universidad

More information

The WebShop e-commerce framework

The WebShop e-commerce framework The WebShop e-commerce framework Marcus Fontoura 1, Wolfgang Pree 2, and Bernhard Rumpe 3 1 Cyberspace and Web Technology Department, IBM Almaden Research Center 650 Harry Rd., San Jose, CA, 91520, U.S.A

More information

Contact ID as of 2/2/2015

Contact ID as of 2/2/2015 Contact ID as of 2/2/2015 100 Medical Zone A non-specific medical exists 101 Personal Emergency Zone Emergency Assistance request 102 Fail to report in Zone A user has failed to activate a monitoring device

More information

POWER POWER ABC DEF GHI JKL ABC DEF GHI JKL COMMAND YZ COMMAND POWER ABC DEF GHI JKL COMMAND YZ USER'S GUIDE

POWER POWER ABC DEF GHI JKL ABC DEF GHI JKL COMMAND YZ COMMAND POWER ABC DEF GHI JKL COMMAND YZ USER'S GUIDE POWER POWER POWER ABC DEF GHI JKL ABC DEF GHI JKL MNO PQR STU VWX MNO PQR STU VWX YZ COMMAND YZ COMMAND ABC DEF GHI JKL MNO PQR STU VWX COMMAND YZ USER'S GUIDE Security Command User's Guide for 9XR Command

More information

A pattern for the WS-Trust standard for web services

A pattern for the WS-Trust standard for web services A pattern for the WS-Trust standard for web services Ola Ajaj and Eduardo B. Fernandez Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University 777 Glades Road,

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT

A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT Cléver Ricardo Guareis de Farias, Marten van Sinderen and Luís Ferreira Pires Centre for Telematics and Information Technology (CTIT) PO Box

More information

An Analysis Pattern for Invoice Processing Eduardo B. Fernandez 1 and Xiaohong Yuan 2

An Analysis Pattern for Invoice Processing Eduardo B. Fernandez 1 and Xiaohong Yuan 2 An Analysis Pattern for Invoice Processing Eduardo B. Fernandez and Xiaohong Yuan 2 Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL 2 Department of Computer Science

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

Tool Support for Software Variability Management and Product Derivation in Software Product Lines

Tool Support for Software Variability Management and Product Derivation in Software Product Lines Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,

More information

Welcome to Bell Aliant NextGen Home Security

Welcome to Bell Aliant NextGen Home Security Quick Start Guide Welcome to Bell Aliant NextGen Home Security Congratulations! Your home is now protected by the most advanced security technology available. This guide is intended to familiarize you

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note

Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note Text book of CPET 545 Service-Oriented Architecture and Enterprise Application: SOA Principles of Service Design, by Thomas Erl, ISBN

More information

Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture

Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture Delmir de Azevedo Junior 1 and Renato de Campos 2 1 Petrobras University, Republican

More information

SERENITY Pattern-based Software Development Life-Cycle

SERENITY Pattern-based Software Development Life-Cycle SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies

More information

Quality Ensuring Development of Software Processes

Quality Ensuring Development of Software Processes Quality Ensuring Development of Software Processes ALEXANDER FÖRSTER,GREGOR ENGELS Department of Computer Science University of Paderborn D-33095 Paderborn, Germany {alfo engels}@upb.de ABSTRACT: Software

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

270015 - IES - Introduction to Software Engineering

270015 - IES - Introduction to Software Engineering Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 747 - ESSI - Department of Service and Information System Engineering Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS

More information

The SOAP Pattern for Medical Charts

The SOAP Pattern for Medical Charts The SOAP Pattern for Medical Charts Tami Sorgente, Eduardo B. Fernandez, and Maria M. Larrondo Petrie Dept. of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL 3343 tsorgent@fau.edu,

More information

Patterns for Internet shops

Patterns for Internet shops Patterns for Internet shops Eduardo B. Fernandez, Yi Liu, and RouYi Pan Dept. of Computer Science and Engineering. Florida Atlantic University, Boca Raton, FL 33431 ed yliu rpan@cse.fau.edu Abstract Shopping

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Information systems modelling UML and service description languages

Information systems modelling UML and service description languages Internet Engineering Tomasz Babczyński, Zofia Kruczkiewicz Tomasz Kubik Information systems modelling UML and service description languages Student Contact Hours: 25.02.2015- Location: 325 C3 room 25.03.2015:

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Understanding the Code Pad lights...4. Code Pad tones...5. Fully arming the system On MODE...6. Fully arming the system - Quick Arm MODE...

Understanding the Code Pad lights...4. Code Pad tones...5. Fully arming the system On MODE...6. Fully arming the system - Quick Arm MODE... TABLE OF CONTENTS...Glossary of terms...2...code Pad Diagram...3 Understanding the Code Pad lights...4 Code Pad tones...5 Fully arming the system On MODE...6 Fully arming the system - Quick Arm MODE...6

More information

TABLE 1: Wiring Terminals. Connect to... 1C 1H 2C 2H 1H1C 2H1C 2H2C 3H2C

TABLE 1: Wiring Terminals. Connect to... 1C 1H 2C 2H 1H1C 2H1C 2H2C 3H2C Installation TURN OFF POWER TO THE SYSTEM AT THE MAIN POWER PANEL TO AVOID ELECTRICAL SHOCK. Installation should be carried out by an electrician or a qualified technician. 1.1 Find a Location for the

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

How To Control A Car Alarm On A Car With A Remote Control System

How To Control A Car Alarm On A Car With A Remote Control System MODEL CA100 REMOTE CONTROL AUTO ALARM SYSTEM INSTALLATION & OPERATION INSTRUCTIONS WIRING DIAGRAM Black Antenna Wire 6 Pin 6 Pin Mini Connector Valet Switch Blue LED Indicator Blue Wire: (-) 200mA Unlock

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Using triggers and actions

Using triggers and actions Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on

More information

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...

More information

PRT-CTRL-SE. Protege System Controller Reference Manual

PRT-CTRL-SE. Protege System Controller Reference Manual PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

HILLS Series LED Code Pad User Manual

HILLS Series LED Code Pad User Manual HILLS Series LED Code Pad User Manual Not all features may be available on your system Check with your installer to find out which features are programmed Page 2 TABLE OF CONTENTS Code Pad Diagrams...2

More information

SECURITY SYSTEM NOTES. Security System Configuration

SECURITY SYSTEM NOTES. Security System Configuration Installing / Service Company: For Service Call: SECURITY SYSTEM NOTES Security System Configuration Master Code: Auxiliary Code(s) 2 3 4 5 6 "Quick Arm" Digit: Exit Delay Time Auxiliary Exit Delay Time

More information

Welcome to a whole new level of interactive home security

Welcome to a whole new level of interactive home security Welcome to a whole new level of interactive home security User Manual TouchScreen Key Fob Keychain Remote Web Access Mobile Access ReadyHome User Manual Introducing a whole new level of security for the

More information

The Command Dispatcher Pattern

The Command Dispatcher Pattern The Command Dispatcher Pattern Can also be called: Command Evaluator Pattern. Benoit Dupire and Eduardo B Fernandez {bdupire@seatech.fau.edu, ed@cse.fau.edu} Department of Computer Science and Engineering.

More information

NetworX Series. NX- 4/8 Code Pad. User Manual (Australian Version)

NetworX Series. NX- 4/8 Code Pad. User Manual (Australian Version) NetworX Series NX- 4/8 Code Pad User Manual (Australian Version) Table Of Contents Code Pad Diagram... Inside Front Glossary of Terms...2 Understanding the Code Pad lights...3 Code Pad Tones...4 Fully

More information

GE Concord 4 Quick User Guide

GE Concord 4 Quick User Guide GE Concord 4 Quick User Guide GE Concord 4 Quick User Guide Page 1 Before Calling Is the keypad beeping? Press *. This will silence the beeping and let you know where the trouble is. Is there a flashing

More information

Access Control Interface Module D9210C. Program Entry Guide

Access Control Interface Module D9210C. Program Entry Guide Access Control Interface Module D9210C en Program Entry Guide Access Control Interface Module Table of Contents en 3 Table of Contents 1 Trademarks 4 2 Door Profile 5 3 Strike Profile 9 4 Event Profile

More information

A Review of an MVC Framework based Software Development

A Review of an MVC Framework based Software Development , pp. 213-220 http://dx.doi.org/10.14257/ijseia.2014.8.10.19 A Review of an MVC Framework based Software Development Ronnie D. Caytiles and Sunguk Lee * Department of Multimedia Engineering, Hannam University

More information

Doc 10. UTM Standards: Card Access Security System

Doc 10. UTM Standards: Card Access Security System Doc 10 UTM Standards: Card Access Security System 1. GENERAL... 2 1.1. GENERAL REQUIREMENTS.... 2 1.2. SUMMARY OF WORK INCLUDED... 2 1.3. OVERVIEW... 2 1.4. MANDATORY REQUIREMENTS... 3 1.5. ACCESS CONTROL

More information

Using Your. Security System With Icon Keypad S5020, S5021, S5022

Using Your. Security System With Icon Keypad S5020, S5021, S5022 Using Your Security System With Icon Keypad S5020, S5021, S5022 Contents 1 Overview Your Security System... 1 How Your Security System Works... 2 Your System's Programming... 3 Getting Used to Your System...

More information

Towards an Automated Pattern Selection Procedure in Software Models

Towards an Automated Pattern Selection Procedure in Software Models Towards an Automated Pattern Selection Procedure in Software Models Alexander van den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, and Wouter Joosen {firstname.lastname}@cs.kuleuven.be IBBT-DistriNet,

More information

Cloud Infrastructure Pattern

Cloud Infrastructure Pattern 1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

User s Information Guide R1A

User s Information Guide R1A HSC505-R Home Security Controller - User Manual Release R1a Pi HSC505 and Pi HSC505R Home Security Controller User s Information Guide R1A Page 1 QD Dynamics (Pty) Ltd reserves the right to make changes

More information

Patterns for Session-Based Access Control

Patterns for Session-Based Access Control Patterns for Session-Based Access Control Eduardo B. Fernandez ) and Günther Pernul 2) Dept. of Computer Science and Engineerging Florida Atlantic University Boca Raton, FL 3343, USA ed@cse.fau.edu 2)

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Building Integration System (BIS)

Building Integration System (BIS) Building Integration System (BIS) The Bosch Building Integration System (BIS) is an open PC-based system that applies the best elements of security system technology with the advantages of the latest information

More information

7 Using the Alarm Ready Schedule

7 Using the Alarm Ready Schedule 7 Using the Alarm Ready Schedule Feature 7.1 Definition An Alarm Ready Schedule is defined as an interval of time during which the Verbatim autodialer is ARMED and Ready to respond to alarm conditions.

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

SECTION 13850 DETECTION AND ALARM

SECTION 13850 DETECTION AND ALARM SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring

More information

Introduction. Observation Patterns. Accounting Patterns. How to use Patterns

Introduction. Observation Patterns. Accounting Patterns. How to use Patterns Analysis Martin Fowler fowler@acm acm.org http://ourworld ourworld.compuserve.com/homepages/martin_fowler Page Martin Fowler 9//99 What we will cover Introduction Observation Accounting How to use Page

More information

HILLS Series LED Code Pad User Manual

HILLS Series LED Code Pad User Manual HILLS Series LED Code Pad User Manual Not all features may be available on your system Check with your installer to find out which features are programmed Page 2 TABLE OF CONTENTS Code Pad Diagrams...2

More information

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL January, 2003 Environmental Health and Safety Florida Atlantic University 777 Glades Rd. Boca Raton, FL 33431 Phone: 561-297-3129 Fax:

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

Control/Communicator Installation Manual

Control/Communicator Installation Manual DAS NETWORX NX-8 Control/Communicator Installation Manual Page General Description... 2 Ordering Information... 2 Option Definitions... 2 Programming the LED Code Pads... 4 Programming the NX-8... 8 Types

More information

More patterns for operating systems access control

More patterns for operating systems access control More patterns for operating systems access control Eduardo B. Fernandez and John C. Sinibaldi Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL, USA ed@cse.fau.edu, cinbad@attglobal.net

More information

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES IMPORTANT SUPPORT RESOURCES Subscriber Portal Go to https://portal.coxhomelife.com to log in to your account and manage your system features online. Online Support Go to www.cox.com/homelifesupport to

More information

I219 Software Design Methodology

I219 Software Design Methodology I219 Software Design Methodology JAIST Master s Program Fall 2014 Nguyen Van Vu nvu@fit.hcmus.edu.vn Topics Course Introduction Objectives and Scope Evaluation Policies Content and Schedule Basic Concepts

More information

Types of UML Diagram. UML Diagrams 140703-OOAD. Computer Engineering Sem -IV

Types of UML Diagram. UML Diagrams 140703-OOAD. Computer Engineering Sem -IV 140703-OOAD Computer Engineering Sem -IV Introduction to UML - UML Unified Modeling Language diagram is designed to let developers and customers view a software system from a different perspective and

More information

Windows Server 2008 R2 Remote Desktop Services

Windows Server 2008 R2 Remote Desktop Services Microsoft Windows Server 2008 R2 Remote Desktop Services Resource Kit Christa Anderson and Kristin L. Griffin with the Remote Desktop Virtualization Team Acknowledgments Introduction xv xvii Chapter 1

More information

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1

S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY. SIERRA Page 1 S I E R R A PRODUCT INFORMATION GUIDE FOR HOME SECURITY SIERRA Page 1 C O N T E N T S USING YOUR SIERRA SYSTEM: Turning On/Off Home Arming Instant Home Arming Quick Exit Mode Chime Mode SPECIAL FUNCTIONS:

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

Security Testing. How security testing is different Types of security attacks Threat modelling

Security Testing. How security testing is different Types of security attacks Threat modelling Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making

More information

Home Appliance Control System

Home Appliance Control System Home Appliance Control System Object-Oriented Analysis & Design Project Phase 1 CS 6359 Object-Oriented Analysis and Design Dr Lawrence Chung Summer 2005 Section 581 Group Members: Uttama Shakya: http://www.utdallas.edu/~uxs023000/

More information

$FFHVV&RQWURO6WDUWHU.LW

$FFHVV&RQWURO6WDUWHU.LW 9LVWD.H\6. $FFHVV&RQWURO6WDUWHU.LW 8VHU*XLGH CARD READER DOOR STRIKE REQUEST TO EXIT VistaKey-SK ALARM SYSTEM CONTROL PANEL DOOR STATUS MONITOR K5398 6/00 TABLE OF CONTENTS OVERVIEW...4 INTRODUCTION...4

More information

1R / 4-BUTTON SERIES

1R / 4-BUTTON SERIES Button 1 1R / 4-BUTTON SERIES VEHICLE SECURITY SYSTEM Standard Features: Two 4-Button Remote Transmitters Status indicator (LED) Valet / override switch Multi-tone siren Dual stage impact detector Remote

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information